-
1
-
-
24944554962
-
Fuzzy identity based encryption
-
Aarhus, Denmark
-
A.Sahai, B. Waters, "Fuzzy Identity Based Encryption", In 24th Advances International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, pp. 457-473, 2005.
-
(2005)
24th Advances International Conference on the Theory and Applications of Cryptographic Techniques
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
2
-
-
79951970585
-
AB-ACCS: A cryptographic access control scheme for cloud storage
-
C.Hong, M.zhang, D.G.Feng, "AB-ACCS: A Cryptographic Access Control Scheme for Cloud Storage," Journal of Computer Research and Development, vol. 47(Suppl.), pp. 259-265, 2010.
-
(2010)
Journal of Computer Research and Development
, vol.47
, Issue.SUPPL.
, pp. 259-265
-
-
Hong, C.1
Zhang, M.2
Feng, D.G.3
-
3
-
-
70849129867
-
Combining attribute-based and access systems
-
Vancouver, Canada
-
B.Malek, A.Miri, "Combining attribute-based and access systems," Proceedings of 12th IEEE In!' I Conf on Computational Science and Engineering. Vancouver, Canada, pp. 305-312, 2009.
-
(2009)
Proceedings of 12th IEEE In!' i Conf on Computational Science and Engineering
, pp. 305-312
-
-
Malek, B.1
Miri, A.2
-
4
-
-
34547273527
-
Attribute-based encryption for finegrained access control of encrypted data
-
New York, USA
-
V.Goyal, O.Pandey, A. Sahar, et ai, "Attribute-based encryption for finegrained access control of encrypted data", Proceedings of the 13th ACM Conference on Computer and Communication Security, New York, USA, pp. 89-98, 2006.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communication Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahar, A.3
-
5
-
-
34548731375
-
Ciphertext-policy attributed-based encryption
-
Berkeley, California, USA
-
L. Bethencourt, A. Sahai, B. Wwters, "Ciphertext-policy attributed-based encryption", IEEE Symposium on Security and Priivacy. Berkeley, California,USA, pp. 321-334, 2007.
-
(2007)
IEEE Symposium on Security and Priivacy
, pp. 321-334
-
-
Bethencourt, L.1
Sahai, A.2
Wwters, B.3
-
6
-
-
77956137294
-
Cryptographic cloud storage
-
S.Kamara, K.Lauter, "Cryptographic Cloud Storage", FC 2010 Workshops, LNCS 6054, pp. 136-149, 2010.
-
(2010)
FC 2010 Workshops, LNCS 6054
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
7
-
-
79956315357
-
Hierarchical attribute-set based encryption for scalable, flexible and fine-grained access control in cloud computing
-
J.Liu, Z.G. Wan, M.Gu, "Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing," ISPEC 2011, LNCS 6672, pp. 98-107, 2011.
-
(2011)
ISPEC 2011, LNCS 6672
, pp. 98-107
-
-
Liu, J.1
Wan, Z.G.2
Gu, M.3
-
8
-
-
78649998200
-
Access control in cloud storage services
-
GJ.Wang, Q.Liu, lWu, "Access Control in Cloud Storage Services," CCS'IO, pp. 735-737, 2010.
-
(2010)
Ccs'Io
, pp. 735-737
-
-
Wang, G.J.1
Liu, Q.2
Wu, L.3
-
9
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
New York, NY, USA: ACM
-
S.Yu, C.Wang, K.Ren, et aI, "Attribute based data sharing with attribute revocation," Proceeding of the 5th International Symposium on Information, Computer and Communications Security (ASIACCS,20IO). New York, NY, USA: ACM, pp. 261-270, 2010.
-
(2010)
Proceeding of the 5th International Symposium on Information, Computer and Communications Security (ASIACCS, 20IO)
, pp. 261-270
-
-
Yu, S.1
Wang, C.2
Ren, K.3
-
10
-
-
78651426152
-
An encryption scheme for a secure policy updating
-
Athens, Greece
-
I.Luan, A.Muhammad, P.Milan, "An encryption scheme for a secure policy updating", In: International Conference on Security and Cryptography, SECRYPT 2010, Athens,Greece, pp. 399-408,2010. 55
-
(2010)
International Conference on Security and Cryptography, SECRYPT 2010
, vol.55
, pp. 399-408
-
-
Luan, I.1
Muhammad, A.2
Milan, P.3
-
11
-
-
77953310709
-
Achieving secure, scalable, and finegrained data access control in cloud computing
-
San, Diego, CA
-
S.Yu, C.Wang, K.Ren, et aI, "Achieving secure, scalable, and finegrained data access control in cloud computing," Proceeding of IEEE INFOCOM 2010, San, Diego, CA, pp. 1-9,2010.
-
(2010)
Proceeding of IEEE INFOCOM 2010
, pp. 1-9
-
-
Yu, S.1
Wang, C.2
Ren, K.3
-
12
-
-
84957718934
-
Divertible protocols and atomicproxy cryptography
-
Helsinki, Finland,. Berlin, Heidelberg: Springer-Verlag, 1998
-
M.Blaze, G.Bleumer, M. Strauss Divertible protocols and atomicproxy cryptography", Proceedings of the Advances in Cryptology (EURO CRYPT), Helsinki, Finland, 1998. Berlin, Heidelberg: Springer-Verlag, 1998:127-144.
-
(1998)
Proceedings of the Advances in Cryptology (EURO CRYPT)
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
|